SlideShare ist ein Scribd-Unternehmen logo
1 von 16
PERFORMANCE EVALUATION ON
              DIFFERENT STEGNOGRAPHIC
                    ALGORITHMS




JAYESH S, AP , Archana College Of Engineering – ALAPPUZHA
    AJAL.A.J , ASSISTANT PROFESSOR , FISAT – KOCHI
  VINOTHKUMAR.S , Scholar at PRIST University, Thanjavur
      HRIDYA K S - A P , K R G C E W – ALAPPUZHA
http://edition.cnn.com/video/?/video/world/2012/04/30/pkg-robertson-al-qaeda-documen
http://www.usatoday.com/tech/news/2001-02-05-binladen.htm
Contents


Steganography and Steganalysis

  Steganographic schemes

        System Features

   Improvement / Comparison

  Conclusion and Future Work
What is Steganography?

 Origin of the term:   steganos: secret – graphy:
 writing
Steganalysis
♦ Passive steganalysis
   – detect the presence or absence of a message
♦ Active Steganalysis
  – Estimate the message length and location
  – Estimate the Secret Key in embedding
  – Extract the message


   crypto + graphy ( secret + writing )
   stegano + graphy ( cover + writing )
Types of Steganalysis



 Targeted Steganalysis
   Relys on knowing the method used to hide the data & using
    known distinguishing statistics to detect stego images
   Sometimes steganalysts reverse engineer steganographic
    methods
 Blind Steganalysis
   Most beneficial to forensics because it’s not based on
    knowing the algorithm
   Most difficult because the type of images and method of
    hiding data are enormous and continuously changing.
   The current trend is to develop a neural network using
    training images and multiple statistical features. A method
    beyond the scope of this talk.
Other previous work
          in steganalysis

 Provos analyzed two million eBay images (jpeg) but although he
    identified thousands of “suspicious” images, nothing conclusive was
    recovered from any of them
   A statistical method based on pairs of values (POVs) was
    introduced by Pfitzmann and Westfeld, providing very reliable
    results if the message was placed in sequential pixel locations in the
    image
   Fridrich et al has a statistical method called RS steganalysis for
    detection of LSB embedding
   It uses dual statistics derived from spatial correlations in an image
   In a typical cover image the LSB plane can (to some degree) be
    predicted from the remaining 7 bit planes
   This intuitive idea is formulated mathematically resulting in the RS
    method
   The safe-bit rate for the LSB embedding algorithms is less than
Modern Stego Techniques



Outguess
 Stego framework is created by embedding
  hidden data using redundancy of cover image.
 Outguess preserves statistics of the BDCT
  coefficients histogram
 Stego takes two measures before embedding
  data
  - Redundant BDCT coefficients, which has least
  effect on cover image.
  - Adjusts the untouched coefficients.
                                                   9
Modern Stego Techniques (cont’d.)

F5
• Works on JPEG format only.
• Two main security actions against steganalysis
  attacks:
  - Straddling: scatters message uniformly over
  the cover
    image
  - Matrix Embedding: Improves embedding
  efficiency (no. of bits/ change of BDCT coeff.)


                                                    10
Modern Stego Techniques (cont’d.)


MB (Model-based Steganography)
• Correlates embedded data with cover
 image
• Splits cover image into two parts
  - Models parameter of distribution of second given first
  part
  - Encodes second part using model and hidden message
  - Combine these two parts to form stego image
• MB1 operates on JPEG images, uses Cauchy
  distribution to model JPEG histogram


                                                             11
Future of Steganography

 The most important use of
  steganographic techniques will
  probably lie in the field of digital
  watermarking

 Might become limited under laws -
  governments claimed that
  criminals use steganography to
  communicate


                              ...the End
SasuriE ajal
SasuriE ajal
SasuriE ajal
SasuriE ajal

Weitere ähnliche Inhalte

Was ist angesagt?

IEEE Projects on MATLAB Research Assistance
IEEE Projects on MATLAB Research AssistanceIEEE Projects on MATLAB Research Assistance
IEEE Projects on MATLAB Research AssistanceMatlab Simulation
 
Uniform embedding for efficient jpeg steganography
Uniform embedding for efficient jpeg steganographyUniform embedding for efficient jpeg steganography
Uniform embedding for efficient jpeg steganographyShakas Technologies
 
MATLAB Based Final Year Projects Research Help
MATLAB Based Final Year Projects Research HelpMATLAB Based Final Year Projects Research Help
MATLAB Based Final Year Projects Research HelpMatlab Simulation
 
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Anomaly Detection using Deep Auto-Encoders | Gianmario SpacagnaAnomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Anomaly Detection using Deep Auto-Encoders | Gianmario SpacagnaData Science Milan
 
MATLAB Based Projects for M.Tech Research Guidance
MATLAB Based Projects for M.Tech Research GuidanceMATLAB Based Projects for M.Tech Research Guidance
MATLAB Based Projects for M.Tech Research GuidanceMatlab Simulation
 
IRJET-Breast Cancer Detection using Convolution Neural Network
IRJET-Breast Cancer Detection using Convolution Neural NetworkIRJET-Breast Cancer Detection using Convolution Neural Network
IRJET-Breast Cancer Detection using Convolution Neural NetworkIRJET Journal
 
Geek Night 17.0 - Artificial Intelligence and Machine Learning
Geek Night 17.0 - Artificial Intelligence and Machine LearningGeek Night 17.0 - Artificial Intelligence and Machine Learning
Geek Night 17.0 - Artificial Intelligence and Machine LearningGeekNightHyderabad
 
Master's degree thesis testing algorithms for image & video understanding
Master's degree thesis   testing algorithms for image & video understandingMaster's degree thesis   testing algorithms for image & video understanding
Master's degree thesis testing algorithms for image & video understandingEnrico Busto
 
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...COMPEGENCE
 
Computational decision making
Computational decision makingComputational decision making
Computational decision makingBoris Adryan
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesITU
 
Matlab Digital Image Processing titles 2014-15 from Brainstorm Innovation
Matlab Digital Image Processing titles 2014-15 from Brainstorm InnovationMatlab Digital Image Processing titles 2014-15 from Brainstorm Innovation
Matlab Digital Image Processing titles 2014-15 from Brainstorm InnovationBrainstorm Innovation
 
MATLAB Based Project List Research Topics
MATLAB Based Project List Research TopicsMATLAB Based Project List Research Topics
MATLAB Based Project List Research TopicsMatlab Simulation
 
MATLAB Projects List Research Assistance
MATLAB Projects List Research AssistanceMATLAB Projects List Research Assistance
MATLAB Projects List Research AssistanceMatlab Simulation
 

Was ist angesagt? (20)

23
2323
23
 
IEEE Projects on MATLAB Research Assistance
IEEE Projects on MATLAB Research AssistanceIEEE Projects on MATLAB Research Assistance
IEEE Projects on MATLAB Research Assistance
 
Uniform embedding for efficient jpeg steganography
Uniform embedding for efficient jpeg steganographyUniform embedding for efficient jpeg steganography
Uniform embedding for efficient jpeg steganography
 
MATLAB Based Final Year Projects Research Help
MATLAB Based Final Year Projects Research HelpMATLAB Based Final Year Projects Research Help
MATLAB Based Final Year Projects Research Help
 
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Anomaly Detection using Deep Auto-Encoders | Gianmario SpacagnaAnomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
Anomaly Detection using Deep Auto-Encoders | Gianmario Spacagna
 
Ieee Cybernetics Titles
Ieee Cybernetics TitlesIeee Cybernetics Titles
Ieee Cybernetics Titles
 
MATLAB Based Projects for M.Tech Research Guidance
MATLAB Based Projects for M.Tech Research GuidanceMATLAB Based Projects for M.Tech Research Guidance
MATLAB Based Projects for M.Tech Research Guidance
 
IRJET-Breast Cancer Detection using Convolution Neural Network
IRJET-Breast Cancer Detection using Convolution Neural NetworkIRJET-Breast Cancer Detection using Convolution Neural Network
IRJET-Breast Cancer Detection using Convolution Neural Network
 
Neuro network1
Neuro network1Neuro network1
Neuro network1
 
Resume
ResumeResume
Resume
 
Geek Night 17.0 - Artificial Intelligence and Machine Learning
Geek Night 17.0 - Artificial Intelligence and Machine LearningGeek Night 17.0 - Artificial Intelligence and Machine Learning
Geek Night 17.0 - Artificial Intelligence and Machine Learning
 
Master's degree thesis testing algorithms for image & video understanding
Master's degree thesis   testing algorithms for image & video understandingMaster's degree thesis   testing algorithms for image & video understanding
Master's degree thesis testing algorithms for image & video understanding
 
21
2121
21
 
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
Compegence: Dr. Rajaram Kudli - An Introduction to Artificial Neural Network ...
 
Computational decision making
Computational decision makingComputational decision making
Computational decision making
 
Cv
CvCv
Cv
 
Machine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devicesMachine learning for decentralized and flying radio devices
Machine learning for decentralized and flying radio devices
 
Matlab Digital Image Processing titles 2014-15 from Brainstorm Innovation
Matlab Digital Image Processing titles 2014-15 from Brainstorm InnovationMatlab Digital Image Processing titles 2014-15 from Brainstorm Innovation
Matlab Digital Image Processing titles 2014-15 from Brainstorm Innovation
 
MATLAB Based Project List Research Topics
MATLAB Based Project List Research TopicsMATLAB Based Project List Research Topics
MATLAB Based Project List Research Topics
 
MATLAB Projects List Research Assistance
MATLAB Projects List Research AssistanceMATLAB Projects List Research Assistance
MATLAB Projects List Research Assistance
 

Andere mochten auch

Ajal 2 ppt
Ajal 2 pptAjal 2 ppt
Ajal 2 pptAJAL A J
 
Ajal filters
Ajal filtersAjal filters
Ajal filtersAJAL A J
 
Noc ajal final
Noc ajal  finalNoc ajal  final
Noc ajal finalAJAL A J
 
improvement of electrical power quality using series active and shunt passive...
improvement of electrical power quality using series active and shunt passive...improvement of electrical power quality using series active and shunt passive...
improvement of electrical power quality using series active and shunt passive...Vikram Rawani
 
Ajal UPQC
Ajal UPQC Ajal UPQC
Ajal UPQC AJAL A J
 
Power quality improvement using upqc with soft computing method: Fuzzy logic
Power quality improvement using upqc with soft computing method: Fuzzy logicPower quality improvement using upqc with soft computing method: Fuzzy logic
Power quality improvement using upqc with soft computing method: Fuzzy logicSakti Prasanna Muduli
 
Shunt active power filter
Shunt active power filterShunt active power filter
Shunt active power filterRanganath
 
Passive filters
Passive filtersPassive filters
Passive filtersRania H
 
Active Power Filter
Active Power FilterActive Power Filter
Active Power FilterJawad Iqbal
 

Andere mochten auch (14)

Ajal 2 ppt
Ajal 2 pptAjal 2 ppt
Ajal 2 ppt
 
Ajal filters
Ajal filtersAjal filters
Ajal filters
 
Noc ajal final
Noc ajal  finalNoc ajal  final
Noc ajal final
 
upqc-s by goutham
upqc-s by gouthamupqc-s by goutham
upqc-s by goutham
 
Dsp ajal
Dsp  ajalDsp  ajal
Dsp ajal
 
Sapf2
Sapf2Sapf2
Sapf2
 
improvement of electrical power quality using series active and shunt passive...
improvement of electrical power quality using series active and shunt passive...improvement of electrical power quality using series active and shunt passive...
improvement of electrical power quality using series active and shunt passive...
 
Ajal UPQC
Ajal UPQC Ajal UPQC
Ajal UPQC
 
Power quality improvement using upqc with soft computing method: Fuzzy logic
Power quality improvement using upqc with soft computing method: Fuzzy logicPower quality improvement using upqc with soft computing method: Fuzzy logic
Power quality improvement using upqc with soft computing method: Fuzzy logic
 
Unified power quality conditioner 2
Unified power quality conditioner 2Unified power quality conditioner 2
Unified power quality conditioner 2
 
Shunt active power filter
Shunt active power filterShunt active power filter
Shunt active power filter
 
Passive filters
Passive filtersPassive filters
Passive filters
 
Active Power Filter
Active Power FilterActive Power Filter
Active Power Filter
 
Filters
FiltersFilters
Filters
 

Ähnlich wie SasuriE ajal

Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security byIJNSA Journal
 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IJNSA Journal
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMIDES Editor
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBijcsit
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIRJET Journal
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD Editor
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data SecurityIRJET Journal
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...IJNSA Journal
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageCSCJournals
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...Aparna Nk
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: ReportAparna Nk
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET Journal
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...IJNSA Journal
 

Ähnlich wie SasuriE ajal (20)

Improved steganographic security by
Improved steganographic security byImproved steganographic security by
Improved steganographic security by
 
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
IMPROVED STEGANOGRAPHIC SECURITY BY APPLYING AN IRREGULAR IMAGE SEGMENTATION ...
 
Detecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVMDetecting Original Image Using Histogram, DFT and SVM
Detecting Original Image Using Histogram, DFT and SVM
 
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSBON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
ON THE IMAGE QUALITY AND ENCODING TIMES OF LSB, MSB AND COMBINED LSB-MSB
 
G017444651
G017444651G017444651
G017444651
 
IMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNNIMAGE STEGANOGRAPHY USING CNN
IMAGE STEGANOGRAPHY USING CNN
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
IJERD(www.ijerd.com)International Journal of Engineering Research and Develop...
 
Av4102350358
Av4102350358Av4102350358
Av4102350358
 
O017429398
O017429398O017429398
O017429398
 
IRJET- Application of Machine Learning for Data Security
IRJET-  	  Application of Machine Learning for Data SecurityIRJET-  	  Application of Machine Learning for Data Security
IRJET- Application of Machine Learning for Data Security
 
K0815660
K0815660K0815660
K0815660
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
EVALUATING THE PERFORMANCE OF THE SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPH...
 
Using SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG ImageUsing SBR Algorithm To Hide The Data Into The JPEG Image
Using SBR Algorithm To Hide The Data Into The JPEG Image
 
steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...steganography using genetic algorithm along with visual cryptography for wire...
steganography using genetic algorithm along with visual cryptography for wire...
 
Steganography using visual cryptography: Report
Steganography using visual cryptography: ReportSteganography using visual cryptography: Report
Steganography using visual cryptography: Report
 
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding TechniquesIRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
IRJET-Securing High Capacity Data Hiding using Combined Data Hiding Techniques
 
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
A NEW IMAGE STEGANOGRAPHY ALGORITHM BASED ON MLSB METHOD WITH RANDOM PIXELS S...
 

Mehr von AJAL A J

KEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMKEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMAJAL A J
 
Paleontology Career
Paleontology  CareerPaleontology  Career
Paleontology CareerAJAL A J
 
CHEMISTRY basic concepts of chemistry
CHEMISTRY  basic concepts of chemistryCHEMISTRY  basic concepts of chemistry
CHEMISTRY basic concepts of chemistryAJAL A J
 
Biogeochemical cycles
Biogeochemical cyclesBiogeochemical cycles
Biogeochemical cyclesAJAL A J
 
ac dc bridges
ac dc bridgesac dc bridges
ac dc bridgesAJAL A J
 
Hays bridge schering bridge wien bridge
Hays bridge  schering bridge  wien bridgeHays bridge  schering bridge  wien bridge
Hays bridge schering bridge wien bridgeAJAL A J
 
App Naming Tip
App Naming TipApp Naming Tip
App Naming Tip AJAL A J
 
flora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaflora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaAJAL A J
 
B.Sc Cardiovascular Technology(CVT)
 B.Sc Cardiovascular Technology(CVT)  B.Sc Cardiovascular Technology(CVT)
B.Sc Cardiovascular Technology(CVT) AJAL A J
 
11 business strategies to make profit
11 business strategies to make profit 11 business strategies to make profit
11 business strategies to make profit AJAL A J
 
PCOS Polycystic Ovary Syndrome
PCOS  Polycystic Ovary SyndromePCOS  Polycystic Ovary Syndrome
PCOS Polycystic Ovary SyndromeAJAL A J
 
Courses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesCourses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesAJAL A J
 
MANAGEMENT Stories
 MANAGEMENT Stories MANAGEMENT Stories
MANAGEMENT StoriesAJAL A J
 
NEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYNEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYAJAL A J
 
REVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREREVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREAJAL A J
 
NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S AJAL A J
 
Subjects to study if you want to work for a charity
Subjects to study if you want to work for a charitySubjects to study if you want to work for a charity
Subjects to study if you want to work for a charityAJAL A J
 
IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE AJAL A J
 
Clat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSClat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSAJAL A J
 

Mehr von AJAL A J (20)

KEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAMKEAM KERALA ENTRANCE EXAM
KEAM KERALA ENTRANCE EXAM
 
Paleontology Career
Paleontology  CareerPaleontology  Career
Paleontology Career
 
CHEMISTRY basic concepts of chemistry
CHEMISTRY  basic concepts of chemistryCHEMISTRY  basic concepts of chemistry
CHEMISTRY basic concepts of chemistry
 
Ecology
EcologyEcology
Ecology
 
Biogeochemical cycles
Biogeochemical cyclesBiogeochemical cycles
Biogeochemical cycles
 
ac dc bridges
ac dc bridgesac dc bridges
ac dc bridges
 
Hays bridge schering bridge wien bridge
Hays bridge  schering bridge  wien bridgeHays bridge  schering bridge  wien bridge
Hays bridge schering bridge wien bridge
 
App Naming Tip
App Naming TipApp Naming Tip
App Naming Tip
 
flora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and keralaflora and fauna of himachal pradesh and kerala
flora and fauna of himachal pradesh and kerala
 
B.Sc Cardiovascular Technology(CVT)
 B.Sc Cardiovascular Technology(CVT)  B.Sc Cardiovascular Technology(CVT)
B.Sc Cardiovascular Technology(CVT)
 
11 business strategies to make profit
11 business strategies to make profit 11 business strategies to make profit
11 business strategies to make profit
 
PCOS Polycystic Ovary Syndrome
PCOS  Polycystic Ovary SyndromePCOS  Polycystic Ovary Syndrome
PCOS Polycystic Ovary Syndrome
 
Courses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in HumanitiesCourses and Career Options after Class 12 in Humanities
Courses and Career Options after Class 12 in Humanities
 
MANAGEMENT Stories
 MANAGEMENT Stories MANAGEMENT Stories
MANAGEMENT Stories
 
NEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGYNEET PREPRATION TIPS AND STRATEGY
NEET PREPRATION TIPS AND STRATEGY
 
REVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTUREREVOLUTIONS IN AGRICULTURE
REVOLUTIONS IN AGRICULTURE
 
NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S NRI QUOTA IN NIT'S
NRI QUOTA IN NIT'S
 
Subjects to study if you want to work for a charity
Subjects to study if you want to work for a charitySubjects to study if you want to work for a charity
Subjects to study if you want to work for a charity
 
IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE IIT JEE A KERALA PERSPECTIVE
IIT JEE A KERALA PERSPECTIVE
 
Clat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILSClat 2020 exam COMPLETE DETAILS
Clat 2020 exam COMPLETE DETAILS
 

SasuriE ajal

  • 1. PERFORMANCE EVALUATION ON DIFFERENT STEGNOGRAPHIC ALGORITHMS JAYESH S, AP , Archana College Of Engineering – ALAPPUZHA AJAL.A.J , ASSISTANT PROFESSOR , FISAT – KOCHI VINOTHKUMAR.S , Scholar at PRIST University, Thanjavur HRIDYA K S - A P , K R G C E W – ALAPPUZHA
  • 4. Contents Steganography and Steganalysis Steganographic schemes System Features Improvement / Comparison Conclusion and Future Work
  • 5. What is Steganography?  Origin of the term: steganos: secret – graphy: writing
  • 6. Steganalysis ♦ Passive steganalysis – detect the presence or absence of a message ♦ Active Steganalysis – Estimate the message length and location – Estimate the Secret Key in embedding – Extract the message crypto + graphy ( secret + writing ) stegano + graphy ( cover + writing )
  • 7. Types of Steganalysis  Targeted Steganalysis  Relys on knowing the method used to hide the data & using known distinguishing statistics to detect stego images  Sometimes steganalysts reverse engineer steganographic methods  Blind Steganalysis  Most beneficial to forensics because it’s not based on knowing the algorithm  Most difficult because the type of images and method of hiding data are enormous and continuously changing.  The current trend is to develop a neural network using training images and multiple statistical features. A method beyond the scope of this talk.
  • 8. Other previous work in steganalysis  Provos analyzed two million eBay images (jpeg) but although he identified thousands of “suspicious” images, nothing conclusive was recovered from any of them  A statistical method based on pairs of values (POVs) was introduced by Pfitzmann and Westfeld, providing very reliable results if the message was placed in sequential pixel locations in the image  Fridrich et al has a statistical method called RS steganalysis for detection of LSB embedding  It uses dual statistics derived from spatial correlations in an image  In a typical cover image the LSB plane can (to some degree) be predicted from the remaining 7 bit planes  This intuitive idea is formulated mathematically resulting in the RS method  The safe-bit rate for the LSB embedding algorithms is less than
  • 9. Modern Stego Techniques Outguess  Stego framework is created by embedding hidden data using redundancy of cover image.  Outguess preserves statistics of the BDCT coefficients histogram  Stego takes two measures before embedding data - Redundant BDCT coefficients, which has least effect on cover image. - Adjusts the untouched coefficients. 9
  • 10. Modern Stego Techniques (cont’d.) F5 • Works on JPEG format only. • Two main security actions against steganalysis attacks: - Straddling: scatters message uniformly over the cover image - Matrix Embedding: Improves embedding efficiency (no. of bits/ change of BDCT coeff.) 10
  • 11. Modern Stego Techniques (cont’d.) MB (Model-based Steganography) • Correlates embedded data with cover image • Splits cover image into two parts - Models parameter of distribution of second given first part - Encodes second part using model and hidden message - Combine these two parts to form stego image • MB1 operates on JPEG images, uses Cauchy distribution to model JPEG histogram 11
  • 12. Future of Steganography  The most important use of steganographic techniques will probably lie in the field of digital watermarking  Might become limited under laws - governments claimed that criminals use steganography to communicate ...the End